Cargando…
Information Security Scheme Based on Computational Temporal Ghost Imaging
An information security scheme based on computational temporal ghost imaging is proposed. A sequence of independent 2D random binary patterns are used as encryption key to multiply with the 1D data stream. The cipher text is obtained by summing the weighted encryption key. The decryption process can...
Autores principales: | , , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Nature Publishing Group UK
2017
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5550463/ https://www.ncbi.nlm.nih.gov/pubmed/28794473 http://dx.doi.org/10.1038/s41598-017-07816-2 |
_version_ | 1783256132502945792 |
---|---|
author | Jiang, Shan Wang, Yurong Long, Tao Meng, Xiangfeng Yang, Xiulun Shu, Rong Sun, Baoqing |
author_facet | Jiang, Shan Wang, Yurong Long, Tao Meng, Xiangfeng Yang, Xiulun Shu, Rong Sun, Baoqing |
author_sort | Jiang, Shan |
collection | PubMed |
description | An information security scheme based on computational temporal ghost imaging is proposed. A sequence of independent 2D random binary patterns are used as encryption key to multiply with the 1D data stream. The cipher text is obtained by summing the weighted encryption key. The decryption process can be realized by correlation measurement between the encrypted information and the encryption key. Due to the instinct high-level randomness of the key, the security of this method is greatly guaranteed. The feasibility of this method and robustness against both occlusion and additional noise attacks are discussed with simulation, respectively. |
format | Online Article Text |
id | pubmed-5550463 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2017 |
publisher | Nature Publishing Group UK |
record_format | MEDLINE/PubMed |
spelling | pubmed-55504632017-08-11 Information Security Scheme Based on Computational Temporal Ghost Imaging Jiang, Shan Wang, Yurong Long, Tao Meng, Xiangfeng Yang, Xiulun Shu, Rong Sun, Baoqing Sci Rep Article An information security scheme based on computational temporal ghost imaging is proposed. A sequence of independent 2D random binary patterns are used as encryption key to multiply with the 1D data stream. The cipher text is obtained by summing the weighted encryption key. The decryption process can be realized by correlation measurement between the encrypted information and the encryption key. Due to the instinct high-level randomness of the key, the security of this method is greatly guaranteed. The feasibility of this method and robustness against both occlusion and additional noise attacks are discussed with simulation, respectively. Nature Publishing Group UK 2017-08-09 /pmc/articles/PMC5550463/ /pubmed/28794473 http://dx.doi.org/10.1038/s41598-017-07816-2 Text en © The Author(s) 2017 Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/. |
spellingShingle | Article Jiang, Shan Wang, Yurong Long, Tao Meng, Xiangfeng Yang, Xiulun Shu, Rong Sun, Baoqing Information Security Scheme Based on Computational Temporal Ghost Imaging |
title | Information Security Scheme Based on Computational Temporal Ghost Imaging |
title_full | Information Security Scheme Based on Computational Temporal Ghost Imaging |
title_fullStr | Information Security Scheme Based on Computational Temporal Ghost Imaging |
title_full_unstemmed | Information Security Scheme Based on Computational Temporal Ghost Imaging |
title_short | Information Security Scheme Based on Computational Temporal Ghost Imaging |
title_sort | information security scheme based on computational temporal ghost imaging |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5550463/ https://www.ncbi.nlm.nih.gov/pubmed/28794473 http://dx.doi.org/10.1038/s41598-017-07816-2 |
work_keys_str_mv | AT jiangshan informationsecurityschemebasedoncomputationaltemporalghostimaging AT wangyurong informationsecurityschemebasedoncomputationaltemporalghostimaging AT longtao informationsecurityschemebasedoncomputationaltemporalghostimaging AT mengxiangfeng informationsecurityschemebasedoncomputationaltemporalghostimaging AT yangxiulun informationsecurityschemebasedoncomputationaltemporalghostimaging AT shurong informationsecurityschemebasedoncomputationaltemporalghostimaging AT sunbaoqing informationsecurityschemebasedoncomputationaltemporalghostimaging |